Jump to content
Fi8sVrs

[eBook] The State of the Art in Intrusion Prevention and Detection

Recommended Posts

  • Active Members
Posted

bok.png

Dedicated to

“All the seekers of knowledge and the truth”

Al-Sakib Khan Pathan

 Contents
Preface...............................................................................................................................................ixAcknowledgments .............................................................................................................................xiEditor .............................................................................................................................................xiiiContributors .....................................................................................................................................xv
PART I Network Traf?c Analysis and Management for IDS
Chapter 1
Outlier Detection ..........................................................................................................3
Mohiuddin Ahmed, Abdun Naser Mahmood, and Jiankun Hu
Chapter 2
Network Traf?c Monitoring and Analysis .................................................................23
Jeferson Wilian de Godoy Stênico and Lee Luan Ling
Chapter 3
Using Routers and Honeypots in Combination for Collecting Internet Worm Attacks ........................................................................................................................47
Mohssen Mohammed and Al-Sakib Khan Pathan
Chapter 4
Attack Severity–Based Honeynet Management Framework......................................85
Asit More and Shashikala Tapaswi
PART II IDS Issues for Different Infrastructures
Chapter 5
Intrusion Detection Systems for Critical Infrastructure ..........................................115
Bernardi Pranggono, Kieran McLaughlin, Yi Yang, and Sakir Sezer
Chapter 6
Cyber Security of Smart Grid Infrastructure ...........................................................139
Adnan Anwar and Abdun Naser Mahmood
Chapter 7
Intrusion Detection and Prevention in Cyber Physical Systems ..............................155
Mohamed Azab and Mohamed Eltoweissy
Chapter 8
Encrypted Ranked Proximity and Phrase Searching in the Cloud ..........................187
Steven Zittrower and Cliff C. Zou

viii
Contents
Chapter 9
Intrusion Detection for SCADA Systems .................................................................211
Alaa Atassi, Imad H. Elhajj, Ali Chehab, and Ayman Kayssi
Chapter 10
Hardware Techniques for High-Performance Network Intrusion Detection ...........233
Weirong Jiang and Viktor K. Prasanna
PART III Arti?cial Intelligence Techniques for IDS
Chapter 11
New Unknown Attack Detection with the Neural Network–Based IDS .................259
Przemys?aw Kukie?ka and Zbigniew Kotulski
Chapter 12
Arti?cial Intelligence-Based Intrusion Detection Techniques .................................285
Zahra Jadidi, Vallipuram Muthukkumarasamy, and Elankayer Sithirasenan
Chapter 13
Applications of Machine Learning in Intrusion Detection ......................................311
Yuxin Meng, Yang Xiang, and Lam-For Kwok
PART IV IDS for Wireless Systems
Chapter 14
Introduction to Wireless Intrusion Detection Systems .............................................335
Jonny Milliken
Chapter 15
Cross Layer–Based Intrusion Detection Techniques in Wireless Networks: A Survey ...................................................................................................................361
Subir Halder and Amrita Ghosal
Chapter 16
Intrusion Detection System Architecture for Wireless Sensor Network..................391
Mohammad Saiful Islam Mamun
Chapter 17
Unique Challenges in WiFi Intrusion Detection ......................................................407
Jonny Milliken
Chapter 18
Intrusion Detection Systems for (Wireless) Automation Systems ...........................431
Jana Krimmling and Peter Langendoerfer
Chapter 19
An Innovative Approach of Blending Security Features in Energy-Ef?cient Routing for a Crowded Network of Wireless Sensors ..............................................449
Al-Sakib Khan Pathan and Tarem Ahmed

The State of the Art in Intrusion Prevention and Detection

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...